Cookies on Knowhow Nonprofit

We use cookies in order for parts of NCVO Knowhow to work properly, and also to collect information about how you use the site. We use this information to improve the site and tailor our services to you. For more, see our page on privacy and data protection.

How to protect yourself from Cryptolocker and other ransomware

Cryptolocker is a nasty threat sneaking around the internet masquerading as a pdf file. This type of virus is known as ransomware because it targets files and then locks them up until you pay the demanded ‘ransom’.

Typically, the ‘virus’ will enter your system disguised as an innocent file attachment from a major delivery service offering tracking information or confirming money transfer. Once you have clicked to access the file, the virus will begin to search your machine for files with common extensions such as .doc, .xls, .pdf etc, encrypt those files, then contact the user to demand payment.

Anti-virus and malware tools will remove it, but files that have been infected will remain encrypted unless a payment is made, so it’s essential to prevent infection. The following is a guide to some of the ways you can protect your systems.

1

Beware of attachments

It goes without saying: you should never open an attachment if the email looks at all suspicious, even when the sender appears to be someone you know, and even if the file does not appear to be an executable (.exe) file.

2

Adjust your browser settings

You can enable phishing and malware protection, and block known attack sites in most browsers. Find out more at the links below.

Enable blocking in MS Office

Enable system restore

On Windows PCs, enabling system restore will create a restore point before any major system change that will allow you to roll back your system to its previous status before the change was made. However, this will only affect installed programs and system configurations, not your data.

5

Use cloud storage

More and more organisations are turning to secure cloud storage for their data. Files accessed via the web, rather than your own hard drives or memory sticks, will be inaccessible to ransomware.

6

Review your backup procedures

If the worst comes to the worst, make sure you have made adequate arrangements to enable a full file restore if needed.